FreeBSD : unzip -- input sanitization errors (d9360908-9d52-11e4-87fd-10bf48e1088e)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

oCERT reports :

The UnZip tool is an open source extraction utility for archives
compressed in the zip format.

The unzip command line tool is affected by heap-based buffer overflows
within the CRC32 verification, the test_compr_eb() and the
getZip64Data() functions. The input errors may result in arbitrary
code execution.

A specially crafted zip file, passed to unzip -t, can be used to
trigger the vulnerability.

See also :

http://www.info-zip.org/UnZip.html
https://bugzilla.redhat.com/show_bug.cgi?id=1174844
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-8140
https://bugzilla.redhat.com/show_bug.cgi?id=1174856
http://www.nessus.org/u?ffb14c16

Solution :

Update the affected package.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 80577 ()

Bugtraq ID:

CVE ID: CVE-2014-8139
CVE-2014-8140
CVE-2014-8141

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now